Dropped Files | ZeroBOX
Name 187a633109d25e63_~$fd.wbk
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$fd.wbk
Size 162.0B
Processes 2752 (WINWORD.EXE)
Type data
MD5 b970f3c1a9becafcbd9ec52d2f70fdec
SHA1 a08cb276fb1029d7a424d39fde5e64230a6221bd
SHA256 187a633109d25e63b56939a89687fbe1bc483a00f51a5b6ba8e4ac549cbac5c0
CRC32 02A7F417
ssdeep 3:yW2lWRdvL7YMlbK7g7lxIt50iSjlVtSldXUn:y1lWnlxK7ghqqFSjU
Yara None matched
VirusTotal Search for analysis
Name af7b536fa3babf93_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 2752 (WINWORD.EXE)
Type data
MD5 0bde4514ad907deeb4fe84af456107b4
SHA1 fd88e283d87c7fa66c5748bfffd605b855ad5715
SHA256 af7b536fa3babf93e42c9033d52be536de80de0d1c9cca16379b7d7919737d4a
CRC32 D8E6BEBF
ssdeep 3:yW2lWRdvL7YMlbK7g7lxIt50iSjlVt3ZtFXUn:y1lWnlxK7ghqqFJjU
Yara None matched
VirusTotal Search for analysis
Name 23aa64d49bb9a3d7_~wrs{271bc821-27ab-421e-8c51-16c818f919d8}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{271BC821-27AB-421E-8C51-16C818F919D8}.tmp
Size 12.8KB
Processes 2752 (WINWORD.EXE)
Type data
MD5 4d43666aec427d43077ef1483015351e
SHA1 775a534fe6fa1109e41cb7fa547d3783662c4995
SHA256 23aa64d49bb9a3d75317b38adf910225dd19953477020fd812b6a2e5b03a3378
CRC32 D90728CD
ssdeep 384:zBpAml8+fDFH1DAW0l+uWIyeoArPCZOJ4p:Vn8+f5110l1CZks
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{1ed510db-1858-4562-9825-6bc4b5037b57}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{1ED510DB-1858-4562-9825-6BC4B5037B57}.tmp
Size 1.0KB
Processes 2752 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis